The Linkielist

Linking ideas with the world

Shadow Brokers release 4 year old NSA hacks for Win2k to Windows 8

The Shadow Brokers have leaked more hacking tools stolen from the NSA’s Equation Group – this time four-year-old exploits that attempt to hijack venerable Windows systems, from Windows 2000 up to Server 2012 and Windows 7 and 8. The toolkit puts into anyone’s hands – from moronic script kiddies to hardened crims – highly classified Read more about Shadow Brokers release 4 year old NSA hacks for Win2k to Windows 8[…]

Samsung blocks ability to remap Galaxy S8’s Bixby button

Samsung wants to keep you locked in the Bixby AI ecosystem in its fight against Amazon Alexa, Apple Siri, Google Assistant, and others. Source: Samsung blocks ability to remap Galaxy S8’s Bixby button | ZDNet And Bixby won’t work at all during launch. I’m actually not so very happy with Samsung deciding to ditch the Read more about Samsung blocks ability to remap Galaxy S8’s Bixby button[…]

MS now blocking updates for Win7 & 8 on PCs with modern CPUs. User makes patch to be able to install updates after all.

GitHub user Zeffy has created a patch that removes a limitation that Microsoft imposed on users of 7th generation processors, a limit that prevents users from receiving Windows updates if they still use Windows 7 and 8.1. Source: User-Made Patch Lets Owners of Next-Gen CPUs Install Updates on Windows 7 & 8.1 MS wants to Read more about MS now blocking updates for Win7 & 8 on PCs with modern CPUs. User makes patch to be able to install updates after all.[…]

Scammers place fake pins on Google Maps

A partnership between computer scientists at the University of California San Diego and Google has allowed the search giant to reduce by 70 percent fraudulent business listings in Google Maps. The researchers worked together to analyze more than 100,000 fraudulent listings to determine how scammers had been able to avoid detection—albeit for a limited amount Read more about Scammers place fake pins on Google Maps[…]

Caffe2 Open Source Brings Cross Platform Machine Learning Tools to Developers

We’re committed to providing the community with high-performance machine learning tools so that everyone can create intelligent apps and services. Caffe2 is shipping with tutorials and examples that demonstrate learning at massive scale which can leverage multiple GPUs in one machine or many machines with one or more GPUs. Learn to train and deploy models Read more about Caffe2 Open Source Brings Cross Platform Machine Learning Tools to Developers[…]

AI Otto buys stock for ecommerce, decreases customer returns

The idea is to collect and analyse quantities of information to understand consumer tastes, recommend products to people and personalise websites for customers. Otto’s work stands out because it is already automating business decisions that go beyond customer management. The most important is trying to lower returns of products, which cost the firm millions of Read more about AI Otto buys stock for ecommerce, decreases customer returns[…]

Video Game Maker Sparks Outrage With Trademark of ‘Cyberpunk’

Video game fans have been anticipating the latest franchise from CD Projekt Red, Cyberpunk 2077, for years. But only recently did it come to light that the makers of The Witcher franchise had trademarked the term “Cyberpunk” and this week some fans cried foul. Now, the developer is insisting that everything is ok and they’ll Read more about Video Game Maker Sparks Outrage With Trademark of ‘Cyberpunk’[…]

Shadow Brokers crack open NSA hacking tool cache for world+dog

The self-styled Shadow Brokers group has made a collection of NSA hacking tools and exploits publicly available. The group released a password for their archive, making it available to all and sundry. They (unsuccessfully) attempted to auction off the trove last year. In a (ranty) statement, Shadow Brokers said it was making the 2013 vintage Read more about Shadow Brokers crack open NSA hacking tool cache for world+dog[…]

There’s a big problem with AI: even its creators can’t explain how it works

No one really knows how the most advanced algorithms do what they do. That could be a problem. Source: There’s a big problem with AI: even its creators can’t explain how it works It’s a good run down of some of the places where accountability (self-driving cars, medical recommendations, AI driven tanks and drones, Siri, Read more about There’s a big problem with AI: even its creators can’t explain how it works[…]

Smartphone gyros and open background tabs reveal your inputs, even when locked

Cyber experts at Newcastle University, UK, have revealed the ease with which malicious websites, as well as installed apps, can spy on us using just the information from the motion sensors in our mobile phones. Analysing the movement of the device as we type in information, they have shown it is possible to crack four-digit Read more about Smartphone gyros and open background tabs reveal your inputs, even when locked[…]

Open sourcing Sonnet – a new library for constructing neural networks with Tensorflow

We have found that the flexibility and adaptiveness of TensorFlow lends itself to building higher level frameworks for specific purposes, and we’ve written one for quickly building neural network modules with TF. We are actively developing this codebase, but what we have so far fits our research needs well, and we’re excited to announce that Read more about Open sourcing Sonnet – a new library for constructing neural networks with Tensorflow[…]

“BrickerBot” tries to kill your poorly secured IoT things

The Bricker Bot PDoS attack used Telnet brute force – the same exploit vector used by Mirai – to breach a victim’s devices. Bricker does not try to download a binary, so Radware does not have a complete list of credentials that were used for the brute force attempt, but were able to record that Read more about “BrickerBot” tries to kill your poorly secured IoT things[…]

Cisco Aironet 1830 Series and 1850 Series Access Points Mobility Express with hardcoded passwords

The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Express Software, regardless of whether the device is configured as a master, subordinate, or standalone access point. An attacker who has layer 3 connectivity to an affected device could use Secure Shell (SSH) to log in Read more about Cisco Aironet 1830 Series and 1850 Series Access Points Mobility Express with hardcoded passwords[…]

What  information Windows 10 Creators Update will slurp from your PC

Now Windows 10 Home and Pro has, right now, two levels of data collection, Basic and Full. When a computer is in Basic mode, Microsoft says Win 10 takes a note of the state of your hardware and its specifications, your internet connection quality, records of crashes and hangs by software, any compatibility problems, driver Read more about What  information Windows 10 Creators Update will slurp from your PC[…]

Harry Shearer: Why My ‘Spinal Tap’ Lawsuit Affects All Creators

Last fall, Shearer filed a $125 million lawsuit against Vivendi – the company that owns This Is Spinal Tap – for financial misappropriation and launched a website called Fairness Rocks explaining his lawsuit. He alleged that the company says the four creators between them have only earned $81 in merchandizing income and $98 for their Read more about Harry Shearer: Why My ‘Spinal Tap’ Lawsuit Affects All Creators[…]

Molecule kills elderly cells, reduces signs of aging in mice

Even if you aren’t elderly, your body is home to agents of senility—frail and damaged cells that age us and promote disease. Now, researchers have developed a molecule that selectively destroys these so-called senescent cells. The compound makes old mice act and appear more youthful, providing hope that it may do the same for us. Read more about Molecule kills elderly cells, reduces signs of aging in mice[…]

About 90% of Smart TVs Vulnerable to Remote Hacking via Rogue TV Signals

A new attack on smart TVs allows a malicious actor to take over devices using rogue DVB-T (Digital Video Broadcasting — Terrestrial) signals, get root access on the smart TV, and use the device for all sorts of nasty actions, ranging from DDoS attacks to spying on end users. […] Scheel’s method, which he recently Read more about About 90% of Smart TVs Vulnerable to Remote Hacking via Rogue TV Signals[…]

Virtual lemonade sends colour and taste to a glass of water

Ranasinghe and his team used an RGB colour sensor and a pH sensor to capture the colour and acidity of a freshly poured glass of lemonade. This data was sent to a special tumbler in another location that was filled with water. An electrode around the rim of the tumbler mimicked the sourness of the Read more about Virtual lemonade sends colour and taste to a glass of water[…]

Miele Professional PG 8528 dishwasher insecure – Web Server Directory Traversal

Details: ======== The corresponding embeded webserver “PST10 WebServer” typically listens to port 80 and is prone to a directory traversal attack, therefore an unauthenticated attacker may be able to exploit this issue to access sensitive information to aide in subsequent attacks. Proof of Concept: ================= ~$ telnet 192.168.0.1 80 Trying 192.168.0.1… Connected to 192.168.0.1. Escape Read more about Miele Professional PG 8528 dishwasher insecure – Web Server Directory Traversal[…]